Home
HIGH: 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C 10.0.14393.0 (custom) before 10.0.14393.8868
affected
10.0.17763.0 (custom) before 10.0.17763.8389
affected
10.0.19044.0 (custom) before 10.0.19044.6937
affected
10.0.19045.0 (custom) before 10.0.19045.6937
affected
10.0.22631.0 (custom) before 10.0.22631.6649
affected
10.0.22631.0 (custom) before 10.0.22631.6649
affected
10.0.26100.0 (custom) before 10.0.26100.7840
affected
10.0.26200.0 (custom) before 10.0.26200.7840
affected
10.0.28000.0 (custom) before 10.0.28000.1575
affected
10.0.28000.0 (custom) before 10.0.28000.1575
affected
10.0.14393.0 (custom) before 10.0.14393.8868
affected
10.0.14393.0 (custom) before 10.0.14393.8868
affected
10.0.17763.0 (custom) before 10.0.17763.8389
affected
10.0.17763.0 (custom) before 10.0.17763.8389
affected
10.0.20348.0 (custom) before 10.0.20348.4773
affected
10.0.25398.0 (custom) before 10.0.25398.2149
affected
10.0.26100.0 (custom) before 10.0.26100.32370
affected
10.0.26100.0 (custom) before 10.0.26100.32370
affected
Description
Improper input validation in Windows Hyper-V allows an authorized attacker to execute code locally.
Problem types
CWE-20: Improper Input Validation
CWE-122: Heap-based Buffer Overflow
Product status
References
msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21247 (Windows Hyper-V Remote Code Execution Vulnerability)